Disclose or Exploit? A Game-Theoretic Approach to Strategic Decision Making in Cyber-Warfare
暂无分享,去创建一个
Sushil Jajodia | V. S. Subrahmanian | Roy Lindelauf | Haipeng Chen | Qian Han | Yanhai Xiong | S. Jajodia | Yanhai Xiong | R. Lindelauf | Haipeng Chen | Qian Han
[1] Huseyin Cavusoglu,et al. Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge , 2007, IEEE Transactions on Software Engineering.
[2] Karthik N. Kannan,et al. An Economic Analysis of Market for Software Vulnerabilities , 2004 .
[3] Leyla Bilge,et al. Before we knew it: an empirical study of zero-day attacks in the real world , 2012, CCS.
[4] Lillian Ablon,et al. Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits , 2017 .
[5] David J. Pym,et al. The U.S. Vulnerabilities Equities Process: An Economic Perspective , 2017, GameSec.
[6] Chaim Fershtman,et al. Network Security: Vulnerabilities and Disclosure Policy , 2007, WEIS.
[7] Brian W. Cashell. The Economic Impact of Cyber-Attacks , 2004 .
[8] Bernhard Plattner,et al. Large-scale vulnerability analysis , 2006, LSAD '06.
[9] L. Demause,et al. Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power , 2013 .
[10] Hao Xu,et al. Optimal Policy for Software Vulnerability Disclosure , 2008, Manag. Sci..
[11] Stephanie Forrest,et al. Strategic aspects of cyberattack, attribution, and blame , 2017, Proceedings of the National Academy of Sciences.
[12] Paul A. Watters,et al. A methodology for estimating the tangible cost of data breaches , 2014, J. Inf. Secur. Appl..
[13] Quanyan Zhu,et al. Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems , 2018, GameSec.
[14] Sushil Jajodia,et al. Pareto-Optimal Adversarial Defense of Enterprise Systems , 2015, TSEC.
[15] D. Kushner,et al. The real story of stuxnet , 2013, IEEE Spectrum.
[16] Bernhard Plattner,et al. An economic damage model for large-scale Internet attacks , 2004, 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[17] Ravishankar K. Iyer,et al. Game Theory with Learning for Cyber Security Monitoring , 2016, 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE).
[18] Phongphun Kijsanayothin,et al. Cyber-security analysis of smart grid SCADA systems with game models , 2014, CISR '14.
[19] Stefan Frei,et al. Security econometrics: The dynamics of (in)security , 2009 .